Seung-Man Chun, Yeung-Kyung Woo, Yang Shen, Jongtae Park
{"title":"P2P-based group service management for live video streaming communication","authors":"Seung-Man Chun, Yeung-Kyung Woo, Yang Shen, Jongtae Park","doi":"10.1109/CCIS.2012.6664288","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664288","url":null,"abstract":"As the performance of the next-generation broadband wireless networks is dramatically enhanced, various real time multimedia services have been provided to users through a smart mobile platform. Most of previous research attempts to provide multimedia streaming service are not suitable to support QoS-guaranteed multimedia streaming service. In addition, they have scalability problem with regard to traffic management. In this article, we have designed architecture of P2P-based group service management for live video streaming communication. More specifically, we have designed the group management protocol and algorithm for group member management and the traffic management. We have mathematically analyzed the performance with regard to the average transmission delay.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125672568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianan Wu, Chunguang Zhou, Zhangxu Li, Xuefei Xia, Seng Zhang, You Zhou
{"title":"A novel algorithm for generating simulated genetic data based on K-medoids","authors":"Jianan Wu, Chunguang Zhou, Zhangxu Li, Xuefei Xia, Seng Zhang, You Zhou","doi":"10.1109/CCIS.2012.6664360","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664360","url":null,"abstract":"Genetic data is very important for biological research, but it is hard to be obtained by experiment. In this paper, we introduce an algorithm for generating simulated genetic data based on K-mediods. A concept of Cluster Channel is proposed in this algorithm and used to generate simulated data. The noise of origin data could be eliminated using the proposed method. The experimental results show reliability of simulated genetic data. SAM is used to analyze the simulated data and original data, and we get a conclusion that the simulated data can effectively validate differentially expressed gene detected algorithm.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125678816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of 2-D DOA joint frequency of signal via a single vector hydrophone","authors":"Guolong Liang, Ke Zhang, Jin Fu, Wei-qun Ma","doi":"10.1109/CCIS.2012.6664290","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664290","url":null,"abstract":"Based on a single vector hydrophone, two sub-matrix of the same formation which formed signal data matrix was constructed by delayed time data. On the basis of LS-ESPRIT, the signal data matrix was decomposed by one eigenvalue decomposition to get its eigenvalues and corresponding eigenvectors, which included the information of frequency and angle, so two-dimensional DOA and frequency joint estimation was realized for narrow-band signal. This method had better estimation accuracy, which didn't need any search procedure, the three-dimensional parameter matching was automatically achieved by this method. Compare with DOA matrix method via a single vector hydrophone and LS-ESPRIT method via acoustic pressure array by MATLAB, the results showed that this method have better estimation performance.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131467465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A service integrity assurance framework for cloud computing based on MapReduce","authors":"Yulong Ren, Wen Tang","doi":"10.1109/CCIS.2012.6664404","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664404","url":null,"abstract":"MapReduce is a highly efficient parallel large data sets (greater than 1TB) processing model, widely used in cloud computing environment. The current mainstream cloud computing service providers have adopted Hadoop, the open source MapReduce implementation, to build their cloud computing platform. However, like all open distributed computing frameworks, MapReduce suffers from the service integrity assurance vulnerability: it takes merely one malicious worker to render the overall computation result useless. It is very important to efficiently detect the malicious workers in cloud computing environment. Existing solutions are not effective enough in defeating the malicious behaviour of non-collusive and collusive workers. In this paper, we focus on the mappers, which typically constitute the majority of workers. On the basis of the existing frameworks, we make the master manage the computing workers based on the security levels, and introduce the trusted verifier worker and caching mechanism. According to the system analysis, the service integrity assurance framework suggested in this paper is more efficient and accurate to detect the malicious workers in the cloud computing environment based on MapReduce.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132699253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved security service scheme in mobile cloud environment","authors":"Qinyun Dai, Haijun Yang, Qinfeng Yao, Yaliang Chen","doi":"10.1109/CCIS.2012.6664437","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664437","url":null,"abstract":"Mobile cloud computing which combines mobile computing, mobile internet, and cloud computing, has become an important research area in the information technology since 2009. By introducing the concept and features of mobile cloud computing, we analyze the system structure of mobile cloud computing. Meanwhile, the security threats present in mobile cloud computing environment are given, and solutions for against the corresponding threat are introduced. Finally, an improved security service scheme is put forward to help realize the controllability, customizability and adaptability of the mobile cloud computing environment in this paper.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"99 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134350251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the modeling and analyzing of the role-based threats in the cyberspace","authors":"Y. Hao, Shize Guo, Hong Zhao, Zhe Chen","doi":"10.1109/CCIS.2012.6664595","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664595","url":null,"abstract":"The modeling of the cyberspace and the analyzing of the threats in the cyberspace are both the innovational aspects in the area of defense space. The multi-networks, multi-subsystems, multi-roles and multi-level-threats of the cyberspace cause the nonlinearity and the indefiniteness of it which makes it difficult for us to represent, model and analyze the threat of it. This paper is focused on the study of the building the model of the cyberspace from the view of the roles. Considering the construction of the cyberspace and the actors in the cyberspace being multinetworks and multi-roles, we construct the cyberspace bipartite network to describe the original pattern of connections of it. Then we perform two projections onto the actors and roles separately and construct the actor-network and the role-network based on the cyberspace bipartite network. To analyze the multi-level threats formally, the paper uses the case theory to establish the role-based multi-level threats model called RBT. The article also proposes the methodology using the RBT model to analyze the role-based multi-level threats in the cyberspace formally and effectively.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114224923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach based on TSA-tree for accurate time series classification","authors":"Xiaoxu He, C. Shao","doi":"10.1109/CCIS.2012.6664321","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664321","url":null,"abstract":"In order to improve the performance of time series classification, we introduce a new approach of time series classification. The first step of the approach is to design a feature exaction model based on Trend and Surprise Abstraction tree (TSA-tree). The second step of the approach is to combine the exacted global feature and 1 nearest neighbor to classify time series. The proposed approach is compared with a number of known classifiers by experiments in artificial and real-world data sets. The experimental results show it can reduce the error rates of time series classification, so it is highly competitive with previous approaches.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115141176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A model for collecting virtual machine usage in cloud computing environment","authors":"Yidong Cui, Fuquan Sun","doi":"10.1109/CCIS.2012.6664455","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664455","url":null,"abstract":"The paper proposes a virtual machine usage collection model (VMUCM) to collect virtual machine performance information in cloud environment. The components and the workflow are introduced. In the model, data compression is utilized to save the disk spaces, as well as a real-time monitoring mechanism to oversee the working status of the system. The collected data can be used to help the cloud service providers to develop accounting policies, or improve the quality of real-time services.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115296393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The research of synchronization and consistency of data in mobile environment","authors":"Jinsheng Feng, Xiuquan Qiao, Yong Li","doi":"10.1109/CCIS.2012.6664300","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664300","url":null,"abstract":"In the era of the mobile Internet, network environment is becoming more and more complex. In mobile environment, it cannot guarantee network reliability, terminals cannot be real-time networking, and cannot be easy to transfer larger files. To solve the network traffic burden caused by these problems, a new synchronization of data in mobile environment method to achieve the consistence is presented. This method uses log to store the differences, combined with optimistic replication method of C/S structure. It reduces the communication overhead and is effective in synchronization and consistency of data in multiple mobile terminals. This method has been applied in a mobile application of “address book synchronization Assistant”, and makes address book synchronization simple. Traditionally there are two buttons “backup” and “restore”, but this application changes them to one smart button “sync”. For any modifications in contacts, it can automatically maintain consistency in multi-terminals.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123556423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Apriori algorithm in extracting the key factor","authors":"Yan Peng, Tian Zhou","doi":"10.1109/CCIS.2012.6664374","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664374","url":null,"abstract":"Business strategic decision making is designed to predict and analysis the future plan of the enterprise based on the situation now and the past. It plays an important role in the success or failure of the enterprise. Extracting the key factors in many elements that affect the enterprises' strategic decision making will help the company make the reasonable and effective decision, even the long-term development of the enterprise. The association rules mining can analyze the connection relationship and the causality in many factors. Among the numerous association rules mining methods, we choose the Apriori algorithm. Apriori Algorithm is one of the basic Association Rules Mining. It can reach a correlation between different properties through analyzing attribute value in group of affairs. Based on the balance score card (BSC), we choose five candidate factors that affect the strategic decision in three areas including the customer, the internal operational process and the study innovation. First of all, we sort out the data that based on the practice survey. Secondly, we find out the association between these factors with Apriori and the last we reach a conclusion that the enterprise innovation has a direct influence to the corporate reputation. This experiment which is of great practicability is an application of Apriori in enterprise decision and provides a good assistance for enterprise in strategic decision making.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121082193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}